Combine the two disks into one logical volume

Assignment Help Computer Network Security
Reference no: EM13317752

Question 1

The web administrator of your organisation needs to login remotely to the machine that is running the organisation's public web site.
You tell her that the only way to login is via The Secure Shell|which she knows nothing about! Assuming she is logging in via a
Linux box write a help document for her containing the following

a. A short introduction to SSH, explaining why it is the preferred way of logging into a remote machine|this explanation will need to discuss symmetric and asymmetric key encryption.

b. A discussion of the contents of the le ~/.ssh/known_hosts. Your discussion should include (but not be limitted to):

how the le is populated,  how the keys in the le are used by SSH,  a discussion of \man-in-the-middle" attacks,  why the hostnames in the le are \hashed", and how individual keys can be deleted by ssh-keygen.

c.  A description how to con gure access so that no passwords are needed|that is by using user asymmetric keys. This will require

a discussion (with examples) of the command ssh-keygen, the le ~/.ssh/authorized_keys, passphrase protected keys and the commands ssh-agent and ssh-add.

Notes:

a. Any technical term used must be explained.

b. Your virtual Debian has the SSH dmon installed and run-ning by default|so you can SSH to it from the host system or from a second virtual machine.

c. Your virtual machine has two network interfaces con gured|a host only interface and a NAT interface. To bring the host only network \up" study the man pages interfaces(5), ifup(8) and ifdown(8).

d. You must show the relevant changes/parts of any les discussed.

e. This is a help document so you must explain (in your own words) the purpose of every le and command mentioned (plus any command line options).

Be very clear which key (public or private) is stored on which machine (remote or local)

g. Port forwarding, SSH tunnels and rewalls need not be discussed| they will be covered later in the course.

Question 2
a.  In about a page explain in your own words what a Logical Volume Manager is, its purpose and why it is useful.
b.  Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fstab le to mount the new disk at boot.
c.  Document and explain in your own words the purpose of every command you use (plus any command line options) and any con guration les or scripts you modify or create.

Notes:

a. Be certain to explain the meaning of any tehnical terms you may use|for example, what is a \physical volume", a \volume group", &c.
b. Make use of the utilities pvdisplay, vgdisplay, &c. to show the results of commands and that they have worked.

Question 3

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the les he has been working on for the week backed up automatically that evening to the DVD!

After a bit more questioning you nd out that:


He frequently creates/deletes and changes les on a daily basis.
 He wants to be able to recover les for any given day.
 He only wants his home directory backed up.
 His home directory contains about 2Gbytes of data.
 His desktop machine has a spare disk (mounted as /spare) that has plenty of free space for temporary storage.

Tasks that need to be done:

4a.  Using the information above design a backup policy. Give a detailed description and justi cation of your backup-policy.
b. Using tar, a shell script or scripts and a crontab le implement your backup policy.
c.  Document and explain in your own words the purpose of every command you use (plus any command line options) and any con guration les or scripts you modify or create.

 

Attachment:- Assignment.pdf

Reference no: EM13317752

Questions Cloud

Find the mass of the vehicle and the stiffness and damping : An automobile modeled as a single-degree-of-freedom system free to vibrate in the vertical direction. In a free vibration test the amplitude of oscillation is observed to decrease from 20mm to 2 mm in one cycle which takes 3 seconds.
Discuss the design of a temporary earth support system : Construction dewatering plays are very large role in the todays construction arena. Discuss the role water conditions plays in the planning and design of a temporary earth support system.
What is the magnitude of the gravitational acceleration : After landing on an unfamiliar planet, a space explorer constructs a simple pendulum of length 53.0cm. What is the magnitude of the gravitational acceleration on this planet
How fast are the waves traveling : A fisherman notices that his boat is moving up and down periodically without any horizontal motion, owing to waves on the surface of the water. How fast are the waves traveling
Combine the two disks into one logical volume : Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..
What is the door angular speed : A woman passes through a revolving door with a tangential speed of 1.6m/s if she Is 70 m from the center door, what is the door angular speed
What is the net cash inflow from the sale for situation a : A $125,000 tractor trailer is being depreciated by the Stright Line method over five years to a final Book Value of zero. Half year convention does not apply to this asset, After three years the rig is sold for A
Find the angle through which the drill rotates : A drill starts from rest. After 3.66s of constant angular acceleration, the drill turns at a rate of 2694 rad/a, find the angle through which the drill rotates
What is the solids concentration of primary clarifier sludge : a 20 mgd wastewater treatment plants primary clarifier influent has 800 mg/l solids. the clarifier removes 18 percent of the solids. the sludge flow rate is 0.070 MGD. (a) what is the solids concentration of primary clarifier sludge

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyse security procedures

Analyse security procedures

  Discuss any threats to priva

Companies would share. sign-on Information for any Weh user Mb 0 agree to participate. They would also share personal Information such as call card dela, billing addresses, and personal preferences.

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Discuss two drawbacks of steganography

Discuss two drawbacks of steganography Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd